- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 190字
- 2021-07-02 12:16:32
Configuring the Client and Setting Up Mobile Devices
Once we have Burp Suite up and configured to act as the proxy through which all our communication will go to the target, we need to set up the clients to talk to Burp, so that the communication path is complete.
Almost all clients that can talk to HTTP/HTTPS servers have a way of setting a proxy endpoint. This tells the client that it needs to send the traffic to the proxy endpoint first, which will then forward it to the target. Different clients have different ways of setting this proxy setting. Some clients use the operating system's proxy setting to enforce the path of the traffic.
In this chapter, we shall see how we can set the proxy option for various common clients, both on mobile and traditional computing devices.
We will cover the following topics in the chapter:
- Setting up Firefox, Chrome and Internet Explorer to work with Burp Suite (HTTP and HTTPS)
- Additional browser add-ons that can be used to manage proxy settings
- Setting system-wide proxy for non-proxy-aware clients
- Setting up Android and iOS to work with Burp Suite
- Android應用安全實戰:Frida協議分析
- 網絡安全意識導論
- 深入淺出隱私計算:技術解析與應用實踐
- 軟件開發安全之道:概念、設計與實施
- Python Penetration Testing Cookbook
- 可信計算3.0工程初步(第二版)
- 數據要素安全:新技術、新安全激活新質生產力
- 互聯網企業安全高級指南
- 構建新型網絡形態下的網絡空間安全體系
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 白話零信任
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Malware Analysis
- Web安全攻防從入門到精通
- 黑客攻防入門